Browser in the Browser Attack– Nowadays, the quality of phishing attacks has improved so much that more hackers have taken phishing attacks to the next level since phishing attacks are extremely simple to execute in the world of hacking.
What is browser in the browser attack?
The browser-in-the-browser attack takes use of the single sign-on method, in which you sign in to a third-party website using an existing account from a provider like Google or Facebook, but this time in a phoney sign-in prompt that displays in a different window.
How it works?
A false pop-up window appears, asking the user for their credentials for signing into the website in the previous web browser window, resulting in identity theft.
How to use Browser in the browser attack tool
Each folder has a
script.js file, the beginning of the file has some parameters you can change:
loadTITLE– The title display when loading (e.g. Sign in)
TITLE– The title that shows up for the page (e.g. Sign in to your account now)
loadDOMAINNAME– Domain name when loading (default “”)
DOMAINNAME– Domain name you’re masquerading. (e.g. “https://accounts.google.com/“)
DOMAINNAMEVERIFY– Domain name appears in ssl check (e.g. “accounts.google.com”)
loadDOMAINPATH– Domain path when loading (default “about:blank”)
DOMAINPATH– Domain path (e.g. “/auth/google/login”)
PHISHINGLINK– Phishing link which will be embedded into the iFrame (e.g. “https://example.com“)
loadLOGO– Path to the icon of the website when loading (default “../loading.gif”)
LOGO– Path to the icon of the website you’re masquerading (default “../google.svg”)
loadTIME– Loading time in milisec (it should be set 0.5-2s to make it more realistic)
To Do List
- Customize domain and phishing link
- Maximize mode that will turn into full screen
- Function for minimize button
- Ssl check
- Ssl certificate check
- Appearance effect more realistic
- Detect user color preference
- Other web platforms
- More languages
- Error page if cant load
- Fix some css, animation,…
How Can Businesses Avoid Browser-In-Browser Attacks?
Because SSO has presented organisations and consumers with limitless potential, ignoring its use is not a viable option.
Adding additional levels of security while deploying single sign-on (SSO) could assist firms in preventing browser in the browser attacks and mitigating other dangers.
In general, if you wish to defend yourself from this attack, you should avoid clicking on any unexpected links and avoid connecting your device to any public wifi network.